Differentiated security
Encyclopedia
Differentiated security is a form of computer security
that deploys a range of different security policies and mechanisms according to the identity and context of a user or transaction.
This makes it much more difficult to scale or replicate attacks, since each cluster/individual has a different security profile and there should be no common weaknesses.
One way of achieving this is by subdividing the population into small differentiated clusters. At the extreme, each individual belongs to a different class.
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...
that deploys a range of different security policies and mechanisms according to the identity and context of a user or transaction.
This makes it much more difficult to scale or replicate attacks, since each cluster/individual has a different security profile and there should be no common weaknesses.
One way of achieving this is by subdividing the population into small differentiated clusters. At the extreme, each individual belongs to a different class.
See also
- Differentiated service (design pattern)
- User-centric identityIdentity 2.0Identity 2.0, also called digital identity, is set of methods for identity verification on the internet using emerging user-centric technologies such as Information Cards or OpenID. Identity 2.0 stems from the Web 2.0 theory of the World Wide Web transition...
- Separation of protection and securitySeparation of protection and securityIn computer sciences the separation of protection and security is a design choice. Wulf et al. identified protection as a mechanism and security as a policy, therefore making the protection-security distinction a particular case of the separation of mechanism and policy principle.- Overview :The...
External links
- Differentiated security in wireless networks Andreas Johnsson, 2002.